{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,4]],"date-time":"2025-03-04T05:44:08Z","timestamp":1741067048658,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642195129"},{"type":"electronic","value":"9783642195136"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-19513-6_4","type":"book-chapter","created":{"date-parts":[[2011,3,7]],"date-time":"2011-03-07T01:58:50Z","timestamp":1299463130000},"page":"38-54","source":"Crossref","is-referenced-by-count":0,"title":["Detecting Intermediary Hosts by TCP Latency Measurements"],"prefix":"10.1007","author":[{"given":"Gurvinder","family":"Singh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"Eian","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Svein Y.","family":"Willassen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stig Fr.","family":"Mj\u00f8lsnes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Allman, M., Paxson, V., Stevens, W.: TCP congestion control. RFC 2581 (1999)","DOI":"10.17487\/rfc2581"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Barford, P., Ullrich, J., Yegneswaran, V.: Internet intrusions: global characteristics and prevalence. In: Proceedings of the 2003 ACM SIGMETRICS Conference, pp. 138\u2013147 (2003)","DOI":"10.1145\/781044.781045"},{"key":"4_CR3","unstructured":"Combs, G.: Wireshark - packet analyzer, http:\/\/www.wireshark.org\/ (accessed April 2010)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1109\/ACSAC.2009.51","volume-title":"Proceedings of the 2009 Annual Computer Security Applications Conference","author":"B. Coskun","year":"2009","unstructured":"Coskun, B., Memon, N.: Online Sketching of Network Flows for Real-Time Stepping-Stone Detection. In: Proceedings of the 2009 Annual Computer Security Applications Conference, pp. 473\u2013483. IEEE Computer Society, Los Alamitos (2009)"},{"key":"4_CR5","first-page":"191","volume-title":"Proceedings of the 6th European Symposium on Research in Computer Security","author":"H. Etoh","year":"2000","unstructured":"Etoh, H., Yoda, K.: Finding a connection chain for tracing intruders. In: Proceedings of the 6th European Symposium on Research in Computer Security, pp. 191\u2013205. Springer, Heidelberg (2000)"},{"key":"4_CR6","unstructured":"Giacobbi, G.: The GNU netcat project, http:\/\/netcat.sourceforge.net\/ (accessed April 2010)"},{"key":"4_CR7","unstructured":"Lee, S., Shields, C.: Tracing the source of network attack: A technical, legal and societal problem. In: Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, pp. 239\u2013246 (2001)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Mathewson, N., Dingledine, R., Syverson, P.: Tor: The second generation onion router. In: Proceedings of the 13th USENIX Security Symposium, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"4_CR9","unstructured":"McKenney, P., Lee, D., Denny, B.: Traffic generator tool, http:\/\/www.postel.org\/tg\/ (accessed April 2010)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Nagle, J.: Congestion control in IP\/TCP internetworks. RFC 896 (January 1984)","DOI":"10.17487\/rfc0896"},{"key":"4_CR11","unstructured":"Paxson, V., Zhang, Y.: Detecting stepping stones. In: Proceedings of the 9th USENIX Security Symposium, pp. 171\u2013184 (2000)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Reeves, D., Wang, X.: Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In: Proceedings of the 10th ACM Conference on Computer and Communication Security, pp. 20\u201329 (2003)","DOI":"10.1145\/948109.948115"},{"key":"4_CR13","unstructured":"Riden, J.: Know your enemy lite: Proxy threats - socks v666. Honeynet Project (August 2008), http:\/\/www.honeynet.org\/papers\/proxy"},{"key":"4_CR14","unstructured":"Roesch, M.: Daemonlogger, packet logger, http:\/\/www.snort.org\/users\/roesch\/Site\/Daemonlogger\/Daemonlogger.htm (accessed April 2010)"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/SECPRI.1995.398921","volume-title":"SP 1995: Proceedings of the 1995 IEEE Symposium on Security and Privacy","author":"S. Staniford-Chen","year":"1995","unstructured":"Staniford-Chen, S., Heberlein, L.T.: Holding intruders accountable on the internet. In: SP 1995: Proceedings of the 1995 IEEE Symposium on Security and Privacy, Washington, DC, USA, p. 39. IEEE Computer Society, Los Alamitos (1995)"},{"key":"4_CR16","unstructured":"Stewart, G.: iprelay - a user-space bandwidth shaping TCP proxy daemon, http:\/\/manpages.ubuntu.com\/manpages\/hardy\/man1\/iprelay.1.html (accessed April 2010)"},{"key":"4_CR17","volume-title":"Probability and statistics for engineers and scientists","author":"R. Walpole","year":"2007","unstructured":"Walpole, R., Myers, R., Myers, S., Yee, K.: Probability and statistics for engineers and scientists. Macmillan, New York (2007)"},{"key":"4_CR18","volume-title":"Proc. of the 25th IEEE International Performance Computing and Communication Conference (IPCCC 2006)","author":"L. Zhang","year":"2006","unstructured":"Zhang, L., Persaud, A., Guan, Y., Johnson, A.: Stepping stone attack attribution in non-cooperative IP networks. In: Proc. of the 25th IEEE International Performance Computing and Communication Conference (IPCCC 2006), Washington, DC, USA. IEEE Computer Society, Los Alamitos (April 2006)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Digital Forensics and Cyber Crime"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-19513-6_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T15:08:34Z","timestamp":1741014514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-19513-6_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642195129","9783642195136"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-19513-6_4","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2011]]}}}